analytics
Will GitOps Solve Configuration Security Issues?
Rather than rely only on GitOps, teams should first implement AI and analytics capabilities to reduce human configuration security errors. ...
Security Boulevard
Does Real Queryable Encryption mean there is a Fake Queryable Encryption?
Billy VanCannon, Director of Product Management | | analytics, databases, encryption, mysql, PostgreSQL, Privacy Enhanced Computation, Real Queryable Encryption
TLDR There is no “fake” queryable encryption, but a certain NoSQL database provider has coined the term “Queryable Encryption”, and Baffle has something to say about that. Background To understand real queryable ...
Fleetio Slashes Spam Traffic And Unlocks Valuable Analytics With DataDome
Fleetio, a leading provider of fleet management and maintenance software, encountered a persistent challenge with bot activity affecting lead generation forms on their website and muddying their website analytics. Discover how DataDome ...
First Quarter 2024 Cybersecurity Statistics
Nik Hewitt | | advice, analysis, analytics, anlaysis, Cybersecurity, next gen security, security, Security Research
It’s only January, but already some interesting 2024 cybersecurity statistics are starting to emerge Adding solid statistics to funding requisitions and internal documentation is fundamental to the work of any CISO in ...
Predictive Cybersecurity Analytics: The Future of Security
Nik Hewitt | | advice, analytics, Best Practices, Cybersecurity, next gen security, security, Security Research
Predictive analytics as an essential tool for CISOs in modern cybersecurity strategies In an ever-changing cybersecurity workplace, Chief Information Security Officers (CISOs) are at the forefront of transformation. One of the most ...
Why Cool Dashboards Don’t Equal Effective Security Analytics
Mark Twain once said, “Data is like garbage. You’d better know what you are going to do with it before you collect it.” This statement rings true in today’s cybersecurity landscape. Security ...
Privacy Enhanced Computation Technologies Advantages and Disadvantages
Laura Case, Director of Product Management | | analytics, Data encryption, Privacy Enhanced Computation, privacy regulations, sensitive data
Privacy enhanced computation technologies allow data teams to perform operations on encrypted data. In this blog post, we discussed various technologies. The post Privacy Enhanced Computation Technologies Advantages and Disadvantages appeared first ...
SEC: Companies Have Four Days to Disclose Cyberattacks
The Securities and Exchange Commission (SEC) is trying to bring some order to a sprawling and sometimes unruly enterprise IT world besieged by cyberthreats and rapidly evolving technologies. The SEC this week ...
Security Boulevard
Announcing Baffle Advanced Encryption
Laura Case, Director of Product Management | | analytics, Data encryption, privacy regulations, sensitive data
Baffle Advanced Encryption is the easiest fastest, and most flexible way to analyze your regulated data while meeting compliance requirements The post Announcing Baffle Advanced Encryption appeared first on Baffle ...
30 Sobering Cybersecurity Statistics for 2023
As we move further into 2023, cybersecurity threats continue to evolve, and the numbers show they are becoming increasingly sophisticated and complex Attackers constantly find new ways to breach security defenses, steal ...